19959 shaares
"We can’t continue to craft firewall and access rules based on IP addresses. Not feasible and ultimately, it’s not secure or accurate enough. We need ID-based access rules that not only consider who but what. Not just Bob, but Bob’s phone. Not just Bill, but Bill’s refrigerator. Not just Alice, but Alice’s television. ... A traditional IP-based perimeter just isn’t going to be enough to meet the new requirements for application delivery….”